Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-47212: CWE-190: Integer Overflow or Wraparound in stb stb_vorbis.c

0
Critical
VulnerabilityCVE-2023-47212cvecve-2023-47212cwe-190
Published: Wed May 01 2024 (05/01/2024, 15:31:02 UTC)
Source: CVE Database V5
Vendor/Project: stb
Product: stb_vorbis.c

Description

A heap-based buffer overflow vulnerability exists in the comment functionality of stb _vorbis.c v1.22. A specially crafted .ogg file can lead to an out-of-bounds write. An attacker can provide a malicious file to trigger this vulnerability.

AI-Powered Analysis

AILast updated: 11/04/2025, 22:09:59 UTC

Technical Analysis

CVE-2023-47212 identifies a critical heap-based buffer overflow vulnerability in the stb_vorbis.c library version 1.22, specifically within its comment parsing functionality. The root cause is an integer overflow or wraparound (CWE-190) that occurs when processing specially crafted .ogg audio files. This overflow leads to an out-of-bounds write on the heap, which can corrupt memory and potentially allow arbitrary code execution. The vulnerability is exploitable remotely without any authentication or user interaction, as it only requires the victim to process a malicious .ogg file. The CVSS v3.1 score of 9.8 reflects the high impact on confidentiality, integrity, and availability, with low attack complexity and no privileges required. stb_vorbis.c is a popular open-source library used in various multimedia applications, games, and embedded systems for decoding Ogg Vorbis audio streams. The lack of a current patch increases the urgency for organizations to implement interim mitigations. While no public exploits are known yet, the vulnerability’s characteristics make it a prime target for attackers aiming to compromise systems through multimedia file processing.

Potential Impact

The impact of CVE-2023-47212 on European organizations can be significant due to the widespread use of stb_vorbis.c in multimedia applications, streaming platforms, and embedded devices. Successful exploitation can lead to arbitrary code execution, allowing attackers to gain control over affected systems, steal sensitive data, disrupt services, or deploy ransomware. This is particularly concerning for sectors reliant on audio processing such as media companies, telecommunications, automotive infotainment systems, and IoT devices. The vulnerability’s remote exploitability without user interaction increases the risk of automated attacks and worm-like propagation. European organizations with legacy or unpatched software stacks that include stb_vorbis.c v1.22 are especially vulnerable. The potential for supply chain compromise exists if software vendors or device manufacturers incorporate the vulnerable library without mitigation. This could affect critical infrastructure, government agencies, and private enterprises, leading to operational disruptions and data breaches.

Mitigation Recommendations

1. Monitor for official patches or updates from the stb project and apply them immediately once released. 2. Until a patch is available, implement strict input validation and sanitization on all .ogg files before processing, including size and comment field length checks. 3. Employ runtime protections such as heap canaries, address space layout randomization (ASLR), and control flow integrity (CFI) to mitigate exploitation impact. 4. Use application-layer sandboxing or containerization to isolate processes handling untrusted multimedia content. 5. Conduct code audits and static analysis on any custom integrations of stb_vorbis.c to identify and remediate unsafe parsing logic. 6. Restrict or monitor the ingestion of .ogg files from untrusted sources, especially in automated processing pipelines. 7. Update incident response plans to include detection and mitigation strategies for exploitation attempts involving malformed audio files. 8. Collaborate with vendors and supply chain partners to ensure they are aware of the vulnerability and have mitigation plans in place.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
talos
Date Reserved
2023-11-03T13:54:08.946Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 690a3b5cff58c9332ff08e70

Added to database: 11/4/2025, 5:43:56 PM

Last enriched: 11/4/2025, 10:09:59 PM

Last updated: 11/5/2025, 2:56:31 AM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats